CN106411891B - File processing method and device, server and equipment - Google Patents

File processing method and device, server and equipment Download PDF

Info

Publication number
CN106411891B
CN106411891B CN201610866551.5A CN201610866551A CN106411891B CN 106411891 B CN106411891 B CN 106411891B CN 201610866551 A CN201610866551 A CN 201610866551A CN 106411891 B CN106411891 B CN 106411891B
Authority
CN
China
Prior art keywords
file
virus
target
intelligent terminal
identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610866551.5A
Other languages
Chinese (zh)
Other versions
CN106411891A (en
Inventor
陈勇
李政
陈维扬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201610866551.5A priority Critical patent/CN106411891B/en
Publication of CN106411891A publication Critical patent/CN106411891A/en
Application granted granted Critical
Publication of CN106411891B publication Critical patent/CN106411891B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Virology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The disclosure relates to a file processing method, a device, a server and equipment, wherein the file processing method comprises the following steps: receiving a file identifier, wherein the file identifier is an identifier of a target file downloaded by network equipment; according to the file identification, utilizing a pre-established file library to perform safety check on whether the target file is a virus file; wherein, the file library records the file identification of the virus file; and sending a prompt message for indicating whether the target file is a virus file to the network equipment according to a safety check result. The embodiment of the disclosure can intercept the virus file, does not need to install antivirus software on the intelligent terminal, and can prevent the intelligent terminal from infecting viruses.

Description

file processing method and device, server and equipment
Technical Field
The present disclosure relates to the field of data security technologies, and in particular, to a file processing method, an apparatus, a server, and a device.
background
With the rapid development of network technology, users often upload and download files, however, malicious files with viruses are also very common in some websites due to no very strict regulation constraint, and if users download such virus files using intelligent terminals, the terminals may cause system crash, data loss, privacy disclosure and other problems due to poisoning.
Disclosure of Invention
In order to overcome the problems in the related art, the disclosure provides a file processing method, a file processing device, a server and equipment.
According to a first aspect of embodiments of the present disclosure, there is provided a file processing method, the method including:
Receiving a file identifier, wherein the file identifier is an identifier of a target file downloaded by network equipment;
According to the file identification, utilizing a pre-established file library to perform safety check on whether the target file is a virus file; wherein, the file library records the file identification of the virus file;
And sending a prompt message for indicating whether the target file is a virus file to the network equipment according to a safety check result.
Optionally, the file library further records an association relationship between a file identifier of the virus file and a download address of the security file; and carrying the download address in a prompt message for indicating that the target file is a virus file.
optionally, the file library further records an association relationship among a file identifier of the virus file, a file identifier of the security file, and a download address of the security file.
Optionally, the file library is pre-established in the following manner:
Collecting virus files and obtaining file identifications of the virus files;
collecting a security file corresponding to the virus file, and acquiring a file identifier and a download address of the security file;
and recording the association relation among the file identifier of the virus file, the file identifier of the security file and the download address of the security file.
Optionally, the file identifier includes a hash value.
according to a second aspect of the embodiments of the present disclosure, there is provided a file processing method, the method including:
Downloading a target file in response to a file downloading request initiated by an intelligent terminal;
acquiring a file identifier of the target file and sending the file identifier to a server;
Receiving a prompt message which is sent by a server and used for indicating whether the target file is a virus file or not;
And according to the indication of the prompt message, carrying out corresponding response processing on the file downloading request initiated by the intelligent terminal.
optionally, the performing, according to the indication of the prompt message, a corresponding response process on the file download request initiated by the intelligent terminal includes:
if the prompt message indicates that the target file is a safe file, the target file is sent to the intelligent terminal;
and if the prompt message indicates that the target file is a virus file, sending a virus reminding message to the intelligent terminal.
Optionally, the sending the virus reminding message to the intelligent terminal includes:
And sending a virus reminding message carrying the downloading address to the intelligent terminal according to the downloading address of the safety file corresponding to the virus file carried in the prompting message.
optionally, before sending the virus reminding message to the intelligent terminal, the method further includes:
and generating a virus reminding message in a webpage format according to a preset webpage template.
Optionally, the file identifier includes a hash value.
according to a third aspect of the embodiments of the present disclosure, there is provided a document processing apparatus including:
the file identification receiving module is configured to receive a file identification, wherein the file identification is an identification of a target file downloaded by the network equipment;
the verification module is configured to perform safety verification on whether the target file is a virus file or not by utilizing a pre-established file library according to the file identifier; wherein, the file library records the file identification of the virus file;
And the prompt message sending module is configured to send a prompt message for indicating whether the target file is a virus file or not to the network device according to a security check result.
Optionally, the file library further records a file identifier of the virus file and an association relationship between download addresses of the security files corresponding to the virus file; and carrying the download address in a prompt message for indicating that the target file is a virus file.
Optionally, the file library further records an association relationship among a file identifier of the virus file, a file identifier of the security file corresponding to the virus file, and a download address of the security file.
Optionally, the apparatus further includes a document library establishing module, where the document library establishing module includes:
The virus file collecting submodule is configured to collect virus files and acquire file identifiers of the virus files;
The safety file collecting submodule is configured to collect the safety files corresponding to the virus files and acquire file identifiers and download addresses of the safety files;
and the incidence relation recording submodule is configured to record incidence relations among the file identifier of the virus file, the file identifier of the security file and the download address of the security file.
optionally, the file identifier includes a hash value.
According to a fourth aspect of the embodiments of the present disclosure, there is provided a document processing apparatus including:
the target file downloading module is configured to respond to a file downloading request initiated by the intelligent terminal and download a target file;
the file identifier sending module is configured to acquire a file identifier of the target file and send the file identifier to a server;
the prompt message receiving module is configured to receive a prompt message which is sent by a server and used for indicating whether the target file is a virus file;
and the file processing module is configured to perform corresponding response processing on the file downloading request initiated by the intelligent terminal according to the indication of the prompt message.
Optionally, the file processing module includes a first processing sub-module and a second processing sub-module;
The first processing submodule is configured to send the target file to the intelligent terminal when the prompt message indicates that the target file is a safe file;
The second processing submodule is configured to send a virus reminding message to the intelligent terminal when the prompt message indicates that the target file is a virus file.
optionally, the file processing module includes:
and the virus file processing submodule is configured to send a virus reminding message carrying the downloading address to the intelligent terminal according to the downloading address of the safety file corresponding to the virus file carried in the prompting message.
optionally, the apparatus further comprises: and the virus reminding message generating module is configured to generate a virus reminding message in a webpage format according to a preset webpage template before the file processing module sends the virus reminding message to the intelligent terminal.
Optionally, the file identifier includes a hash value.
according to a fifth aspect of the embodiments of the present disclosure, there is provided a file processing server, including:
a processor;
a memory for storing processor-executable instructions;
Wherein the processor is configured to:
receiving a file identifier, wherein the file identifier is an identifier of a target file downloaded by network equipment;
According to the file identification, utilizing a pre-established file library to perform safety check on whether the target file is a virus file; wherein, the file library records the file identification of the virus file;
And sending a prompt message for indicating whether the target file is a virus file to the network equipment according to a safety check result.
according to a sixth aspect of the embodiments of the present disclosure, there is provided a document processing apparatus including:
A processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
Downloading a target file in response to a file downloading request initiated by an intelligent terminal;
Acquiring a file identifier of the target file and sending the file identifier to a server;
receiving a prompt message which is sent by a server and used for indicating whether the target file is a virus file or not;
And according to the indication of the prompt message, carrying out corresponding response processing on the file downloading request initiated by the intelligent terminal.
the technical scheme provided by the embodiment of the disclosure can have the following beneficial effects:
According to the method and the system, the network equipment connected with the intelligent terminal can download the file, and the file identification of the downloaded file is provided for the server side to carry out safety verification. The server can pre-store the identification of the virus file, so that whether the downloaded file is the virus file is rapidly judged, the prompt message is sent to the network equipment, and the network equipment can perform corresponding processing according to the prompt message, so that the intelligent terminal can avoid virus infection without installing antivirus software.
According to the method and the device, the download address of the security file corresponding to the virus file can be obtained in advance, and therefore after the target file is determined to be the virus file, the network device can be improved to provide the security file to the intelligent terminal, so that the intelligent terminal can download and obtain the corresponding security file.
in the disclosure, the server may pre-establish a file library, pre-collect the virus files, record file identifiers of the virus files, and determine whether the target files are virus files by comparing the file identifiers of the target files with the file identifiers of the virus files. The method is easy to implement, and the virus file identification efficiency and accuracy are high.
In the present disclosure, the file identifier may be a hash value, and even if a great number of identifiers of virus files are stored in the server, the hash value as the file identifier can ensure the uniqueness of the file.
in the disclosure, the virus reminding message can be in a webpage format, and the message in the webpage format occupies a small space and is easier to analyze.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
fig. 1A is an application scenario diagram illustrating a file processing method according to an exemplary embodiment of the present disclosure.
FIG. 1B is a flowchart illustrating a file processing method according to an exemplary embodiment of the present disclosure.
FIG. 1C is a schematic diagram illustrating a virus alert message according to an example embodiment of the present disclosure.
FIG. 2 is a flow chart illustrating another file processing method according to an exemplary embodiment of the present disclosure.
FIG. 3 is a flow chart illustrating another file processing method according to an exemplary embodiment of the present disclosure.
FIG. 4 is a block diagram of a document processing device shown in accordance with an exemplary embodiment of the present disclosure.
FIG. 5 is a block diagram of another document processing device shown in accordance with an exemplary embodiment of the present disclosure.
FIG. 6 is a block diagram of another document processing device shown in accordance with an exemplary embodiment of the present disclosure.
FIG. 7 is a block diagram of another document processing device shown in accordance with an exemplary embodiment of the present disclosure.
FIG. 8 is a block diagram of another document processing device shown in accordance with an exemplary embodiment of the present disclosure.
FIG. 9 is a block diagram of another document processing device shown in accordance with an exemplary embodiment of the present disclosure.
FIG. 10 is a block diagram illustrating a method for file processing apparatus according to an exemplary embodiment of the present disclosure.
FIG. 11 is a block diagram illustrating another apparatus for file processing according to an exemplary embodiment of the present disclosure.
Detailed Description
reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
The terminology used in the present disclosure is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. As used in this disclosure and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present disclosure. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
along with the rapid development of network technology and terminal technology, intelligent terminal has become the indispensable articles for use in people's daily life, and the frequency that the user used intelligent terminal is also higher and higher, and intelligent terminal brings very big convenience for user's life. However, malicious files with viruses are also very common in some web sites, since there are no very strict regulatory constraints. In the existing implementation, antivirus software is usually installed in an intelligent terminal, and after the file downloading is completed, the antivirus software can be operated to scan the downloaded file so as to judge whether the file is a virus file. In this way, since the intelligent terminal is required to be provided with antivirus software, the space of the intelligent terminal is occupied; if the intelligent terminal is not provided with antivirus software, the virus file cannot be identified, and the safe use of the intelligent terminal cannot be ensured.
The scheme provided by the embodiment of the disclosure is different from the conventional means of judging the virus file by the intelligent terminal in the related art, but the file can be downloaded by the network equipment connected with the intelligent terminal, and the file identification of the downloaded file is provided for the server side to carry out security verification. The server can pre-store the identification of the virus file, so as to quickly judge whether the downloaded file is the virus file, and send a prompt message to the network equipment, and the network equipment can perform corresponding processing according to the prompt message. According to the embodiment of the disclosure, antivirus software does not need to be installed on the intelligent terminal, and the intelligent terminal can be prevented from being infected by viruses. The embodiments of the present disclosure are explained in detail below.
fig. 1A is a diagram of an application scenario of file processing according to an exemplary embodiment, where fig. 1A includes a smart phone and a smart tv as smart terminals, and a router and a server as network devices.
The network device is a device connected to each local area network or wide area network in the internet, and may be an interconnection device in a network layer, and may be configured with a processor, a memory, and other devices, so that the device has a computing function, a processing function, and a storage function, and may be, for example, a router and the like.
the server may be a server, a server cluster, a cloud server, or the like. The server of the embodiment of the present disclosure may be a server corresponding to a router.
The intelligent terminal can be a terminal such as a smart phone, a tablet computer, an electronic book reader, a personal digital assistant, a smart television or a personal computer, and can be provided with a communication component which can be accessed to a wireless or wired network based on a communication standard.
As shown in fig. 1B, is a flowchart of a file processing method shown in the present disclosure according to an exemplary embodiment, including the following steps 101 to 106:
in step 101, the intelligent terminal initiates a file download request.
in step 102, the network device downloads the target file in response to a file download request initiated by the electronic device.
in step 103, the network device obtains the file identifier of the target file and sends the file identifier to the server.
In step 104, the server receives the file identifier, and performs security check on whether the target file is a virus file or not by using a pre-established file library according to the file identifier. Wherein, the file library records the file identification of the virus file.
in step 105, according to the security check result, a prompt message for indicating whether the target file is a virus file is sent to the network device.
In step 106, the network device receives the prompt message; and according to the indication of the prompt message, carrying out corresponding response processing on the file downloading request initiated by the intelligent terminal.
in the embodiment of the present disclosure, various applications may be installed in the intelligent terminal, and a user may obtain application functions by using different applications, for example, browsing a web page by using a browser application, downloading an application by using an application mall application, downloading an audio file by using a music playing application, or downloading a video file by using a video playing application. The application usually displays an option or a control and the like for user triggering on a terminal screen, when a user needs to download a file, the user can trigger the option or the control and the like, and the intelligent terminal initiates a file downloading request to the router.
the router may use the scheme provided by the embodiment of the present disclosure, and start downloading the file when detecting the file downloading request initiated by the intelligent terminal, and the embodiment of the present disclosure refers to the downloaded file as the target file. After the target file is downloaded, the intelligent terminal can send the file identifier of the target file to the server.
The file identifier is a unique identifier of a file, and in practical application, the file identifier may be a file name, a custom numerical value, or any combination of character strings, as long as different target files can be distinguished.
The server may create a file library in advance, for example, collect virus files in advance, and record file identifiers of the virus files. The server compares the file identifier of the target file with the file identifier of the virus file, so that whether the target file is the virus file can be determined. The method is easy to implement, and the virus file identification efficiency and accuracy are high.
In an alternative implementation, the file identification may be a HASH (HASH) value.
The HASH value is a value obtained by logical operation based on the content data of the file, and HASH values obtained from different files (even the same file name) are different, so that the HASH value can be understood as the identification card of the file. Files with different HASH values are considered to be different files, and the contents of files with the same HASH value must be identical (even if the file names are different). Since the HASH value is generated by a series of transformations of the file content by the binary code, the HASH value does not change even if the file name changes, and thus the HASH value has a file check function, which is equivalent to a check code of a file. In the embodiment of the disclosure, when the server stores the identifiers of a great number of virus files, the HASH value serving as the file identifier can ensure the uniqueness of the file.
and the server side can obtain the safety verification result that the target file is the virus file or the target file is the safety file after the safety verification that whether the target file is the virus file is carried out through the file identification. According to the security check result, the server may send a prompt message to the router, where the prompt message is used to indicate whether the target file is a virus file.
In this embodiment, the router receives the hint message, and since the hint message indicates whether the target file is secure, the router may perform corresponding response processing. In an optional implementation manner, the performing, according to the indication of the prompt message, a corresponding response process on the file download request initiated by the intelligent terminal includes:
If the target file is a safe file, the downloaded target file can be sent to the intelligent terminal;
If the target file is a virus file, the virus reminding message can be sent to the intelligent terminal to replace the downloaded target file so as to inform the user that the target file is infected by the virus, so that the purpose of intercepting the virus file is achieved, and the safe use of the intelligent terminal is ensured.
In an optional implementation manner, when the server establishes the file library, the server may further collect a security file corresponding to the virus file. The purpose of collecting the security files is to provide the security files to the intelligent terminal after the target files are determined to be virus files, so that the intelligent terminal can download and acquire the corresponding security files. When the server side obtains the security file, the server side can record the download address of the security file, or the security file is stored in the local server side, and the download address of the security file is generated. And then, recording the association relationship between the file identifier of the virus file and the download address of the security file, and according to the association relationship, when the target file is determined to be the virus file, quickly acquiring the download address of the security file corresponding to the virus file, so that when a prompt message is sent to the router, the prompt message can carry the download address.
After the server side obtains the security file, in order to distinguish different security files, the file library can also record the association relationship among the file identifier of the virus file, the file identifier of the security file and the download address of the security file. The document library may be pre-established as follows:
Collecting virus files and obtaining file identifications of the virus files; collecting a security file corresponding to the virus file, and acquiring a file identifier and a download address of the security file; and recording the association relation among the file identifier of the virus file, the file identifier of the security file and the download address of the security file.
In practical application, the file library may record the association relationship in a manner of a relational database. Relational databases store data based on relational schema and digitally process database organizations by recording correspondences between data in a data table, where each row of records (i.e., each record) in the table is a tuple and each record relates to N data, and is referred to as an N-tuple. For example, the following shows a data table in an embodiment, which records association relationships between file identifiers of three virus files and download addresses of the security files:
evilsha downloadur
evilsha1 downloadurl
evilsha2 downloadur2
evilsha3 downloadur3
As can be seen from the data table, the binary < evilsha1, downloadurl > indicates the correspondence between the virus file hash value evilsha1 and the secure file download address downloadurl. According to the records, the file library records the hash value of the virus file and the corresponding secure file download address, so that when the server receives the file identifier of the target file sent by the electronic equipment, whether the file is the virus file can be quickly determined through the records of the file library, and further, under the condition that the file is the virus file, the corresponding secure file download address can be quickly obtained.
It can be understood that, in practical applications, other data may also be recorded in the file library at the same time, for example, as can be seen from the foregoing analysis, when the server establishes the file library, the server may collect the security file corresponding to the virus file, and the server may obtain the hash value of the security file as the file identifier of the security file, and then the data may be recorded in the file library in the form of a triple, for example, the triple may be < evilsha, clearhash >, downtladur >, the evilsha represents the hash value of the virus file, the clearhash represents the hash value of the security file, and the downtladur represents the download address of the security file, so as to achieve the purpose of recording the association relationship among the file identifier of the virus file, the file identifier of the security file, and the download address of the security file.
And under the condition that the prompt message indicates that the target file is a virus file, the router can send a virus reminding message carrying the download address to the intelligent terminal according to the download address carried in the prompt message when receiving the prompt message.
In practical application, the virus reminding message sent by the router to the intelligent terminal may be the above-mentioned prompting message, or a message regenerated by the router. The format of the virus reminding message can be in various forms, such as a data packet format, a text format or a text file format.
in an optional implementation manner, before sending the virus reminding message to the intelligent terminal, the method further includes:
And generating a virus reminding message in a webpage format according to a preset webpage template.
In the embodiment of the present disclosure, the virus reminding message may be in a format of a web page (HTML, HyperText Markup Language), and the message in the format of the web page occupies a small space and is easier to parse. The virus reminding message can be generated by adopting a fixed webpage template, the webpage template can be preset according to actual requirements, the webpage template can be pre-stored in the router or a server side, and when the server side determines that the target file is the virus file, the server side can send the webpage template to the router. The router sends the virus reminding message in the webpage format to the intelligent terminal, and the intelligent terminal can directly open the virus reminding message and display the virus reminding message on a terminal screen. The following illustrates a web page template provided by the embodiment of the present disclosure, and fig. 1C illustrates a schematic diagram of a virus alert message displayed in an intelligent terminal.
<HTML>
<HEAD>
<TITLE>
A Small Hello
</TITLE>
</HEAD>
<BODY>
< H1> Please note that the document is dangerous </H1>
< P > you can choose to download a non-dangerous file from this link:
$$$downloadur</P>
</BODY>
</HTML>
Wherein < TITLE > </TITLE > is a TITLE tag, which represents the TITLE of the message, and is specifically "user, your good" in the embodiment of FIG. 1C, which can be flexibly configured in practical application.
the < BODY > </BODY > is a main BODY label and represents a main BODY of the message, specific display contents, display forms and the like of the virus reminding message can be set in the label, the template is provided with the font size through the < h1> </h1> label, and the < P > </P > label is a paragraph mark label, namely two lines of characters are set to be displayed in a segmented mode.
The $ represents a variable, the security file download address downloadur in the template is a variable, different virus files correspond to different security file download addresses, and the download address in this embodiment is app.xiaomi.com/1234.
as shown in fig. 2, which is a flowchart of another file processing method shown in the present disclosure according to an exemplary embodiment, the method of the embodiment of the present disclosure may be applied to a server, and includes the following steps 201 to 203:
in step 201, a file identifier is received, where the file identifier is an identifier of a target file downloaded by a network device.
In step 202, according to the file identifier, a pre-established file library is used for performing security check on whether the target file is a virus file; wherein, the file library records the file identification of the virus file.
In step 203, according to the security check result, a prompt message for indicating whether the target file is a virus file is sent to the network device.
in the embodiment of the present application, reference may be made to the detailed description in the embodiments shown in fig. 1A to fig. 1C, which is not repeated herein.
The embodiment shows that the file can be downloaded by the network equipment connected with the intelligent terminal, and the file identification of the downloaded file is provided for the server side to carry out safety verification. The server can pre-store the identification of the virus file, so that whether the downloaded file is the virus file is rapidly judged, and a prompt message is sent to the network equipment, so that the virus file is intercepted, the virus killing software does not need to be installed on the intelligent terminal, and the intelligent terminal can be prevented from being infected by the virus.
in an optional implementation manner, the file library further records a file identifier of the virus file and an association relationship between the download addresses of the security files corresponding to the virus file; the prompt message for indicating that the target file is the virus file carries the download address.
According to the embodiment, the download address of the security file corresponding to the virus file can be obtained in advance, and after the target file is determined to be the virus file, the network device can be improved to provide the security file to the intelligent terminal, so that the intelligent terminal can download and obtain the corresponding security file.
In an optional implementation manner, the file library further records an association relationship among a file identifier of the virus file, a file identifier of the security file corresponding to the virus file, and a download address of the security file.
As can be seen from the above embodiments, the file identifier of the security file may also be recorded to distinguish different security files.
In an optional implementation manner, the file library is pre-established by the following method:
Collecting virus files and obtaining file identifications of the virus files;
collecting a security file corresponding to the virus file, and acquiring a file identifier and a download address of the security file;
And recording the association relation among the file identifier of the virus file, the file identifier of the security file and the download address of the security file.
It can be seen from the above embodiments that the server may pre-establish a file library, pre-collect the virus files, record file identifiers of the virus files, and determine whether the target file is a virus file by comparing the file identifier of the target file with the file identifier of the virus file. The method is easy to implement, and the virus file identification efficiency and accuracy are high.
In an alternative implementation, the file identifier includes a hash value.
as can be seen from the foregoing embodiments, the file identifier may be a HASH value, and even if the identifiers of a large number of virus files are stored in the server, the HASH value serving as the file identifier can ensure the uniqueness of the file.
As shown in fig. 3, which is a flowchart illustrating another file processing method according to an exemplary embodiment of the present disclosure, the method of the embodiment of the present disclosure may be applied to a network device, and includes the following steps 301 to 305:
In step 301, a target file is downloaded in response to a file download request initiated by the intelligent terminal.
In step 302, the file identifier of the target file is obtained and sent to the server.
in step 303, a prompt message sent by the server for indicating whether the target file is a virus file is received.
In step 304, according to the indication of the prompt message, a corresponding response process is performed on the file download request initiated by the intelligent terminal.
in the embodiment of the present application, reference may be made to the detailed description in the embodiments shown in fig. 1A to fig. 1C, which is not repeated herein.
the embodiment shows that the file can be downloaded by the network equipment connected with the intelligent terminal, and the file identification of the downloaded file is provided for the server side to carry out safety verification. The server can pre-store the identification of the virus file, so that whether the downloaded file is the virus file is rapidly judged, and a prompt message is sent to the network equipment, the network equipment can send the downloaded file to the intelligent terminal according to the prompt message if the downloaded file is the security file, and the virus prompt message can be used for replacing the downloaded file to send the downloaded file to the intelligent terminal if the downloaded file is the virus file, so that the virus file is intercepted, virus killing software does not need to be installed on the intelligent terminal, and the intelligent terminal can be prevented from being infected by viruses.
in an optional implementation manner, the performing, according to the indication of the prompt message, a corresponding response process on the file download request initiated by the intelligent terminal includes:
If the prompt message indicates that the target file is a safe file, the target file is sent to the intelligent terminal;
And if the prompt message indicates that the target file is a virus file, sending a virus reminding message to the intelligent terminal.
In an optional implementation manner, the sending the virus reminding message to the intelligent terminal includes:
and sending a virus reminding message carrying the downloading address to the intelligent terminal according to the downloading address of the safety file corresponding to the virus file carried in the prompting message.
according to the embodiment, the download address of the security file corresponding to the virus file can be obtained in advance, and after the target file is determined to be the virus file, the network device can be improved to provide the security file to the intelligent terminal, so that the intelligent terminal can download and obtain the corresponding security file.
In an optional implementation manner, before sending the virus reminding message to the intelligent terminal, the method further includes:
And generating a virus reminding message in a webpage format according to a preset webpage template.
it can be seen from the above embodiments that the virus reminding message can be in a web page format, and the message in the web page format occupies a small space and is easier to parse.
In an alternative implementation, the file identifier includes a hash value.
As can be seen from the foregoing embodiments, the file identifier may be a HASH value, and even if the identifiers of a large number of virus files are stored in the server, the HASH value serving as the file identifier can ensure the uniqueness of the file.
Corresponding to the embodiment of the method, the disclosure also provides an embodiment of a file processing device and equipment applied by the file processing device.
As shown in fig. 4, fig. 4 is a block diagram of a document processing apparatus according to an exemplary embodiment of the present disclosure, the apparatus including:
A file identifier receiving module 41 configured to receive a file identifier, where the file identifier is an identifier of a target file downloaded by a network device.
The checking module 42 is configured to perform security check on whether the target file is a virus file or not by using a pre-established file library according to the file identifier; wherein, the file library records the file identification of the virus file.
and a prompt message sending module 43 configured to send a prompt message indicating whether the target file is a virus file to the network device according to the security check result.
The embodiment shows that the file can be downloaded by the network equipment connected with the intelligent terminal, and the file identification of the downloaded file is provided for the server side to carry out safety verification. The server can pre-store the identification of the virus file, so that whether the downloaded file is the virus file is rapidly judged, and a prompt message is sent to the network equipment, so that the virus file is intercepted, the virus killing software does not need to be installed on the intelligent terminal, and the intelligent terminal can be prevented from being infected by the virus.
in an optional implementation manner, the file library further records a file identifier of the virus file and an association relationship between the download addresses of the security files corresponding to the virus file; the prompt message for indicating that the target file is the virus file carries the download address.
according to the embodiment, the download address of the security file corresponding to the virus file can be obtained in advance, and after the target file is determined to be the virus file, the network device can be improved to provide the security file to the intelligent terminal, so that the intelligent terminal can download and obtain the corresponding security file.
In an optional implementation manner, the file library further records an association relationship among a file identifier of the virus file, a file identifier of the security file corresponding to the virus file, and a download address of the security file.
As can be seen from the above embodiments, the file identifier of the security file may also be recorded to distinguish different security files.
As shown in fig. 5, fig. 5 is a block diagram of another file processing apparatus shown in the present disclosure according to an exemplary embodiment, on the basis of the foregoing embodiment shown in fig. 4, the apparatus further includes a file library establishing module 44, and the file library establishing module 44 includes:
the virus file collecting submodule 441 is configured to collect virus files and obtain file identifiers of the virus files.
The security file collecting sub-module 442 is configured to collect the security file corresponding to the virus file, and obtain a file identifier and a download address of the security file.
The association relation recording sub-module 443 is configured to record an association relation among the file identifier of the virus file, the file identifier of the security file, and the download address of the security file.
It can be seen from the above embodiments that the server may pre-establish a file library, pre-collect the virus files, record file identifiers of the virus files, and determine whether the target file is a virus file by comparing the file identifier of the target file with the file identifier of the virus file. The method is easy to implement, and the virus file identification efficiency and accuracy are high.
in an alternative implementation, the file identifier includes a hash value.
As can be seen from the foregoing embodiments, the file identifier may be a HASH value, and even if the identifiers of a large number of virus files are stored in the server, the HASH value serving as the file identifier can ensure the uniqueness of the file.
As shown in fig. 6, fig. 6 is a block diagram of another file processing apparatus according to an exemplary embodiment of the present disclosure, the apparatus including:
and the target file downloading module 61 is configured to respond to a file downloading request initiated by the intelligent terminal and download the target file.
And the file identifier sending module 62 is configured to obtain the file identifier of the target file and send the file identifier to the server.
And the prompt message receiving module 63 is configured to receive a prompt message which is sent by the server and used for indicating whether the target file is a virus file.
And the file processing module 64 is configured to perform corresponding response processing on the file downloading request initiated by the intelligent terminal according to the indication of the prompt message.
The embodiment shows that the file can be downloaded by the network equipment connected with the intelligent terminal, and the file identification of the downloaded file is provided for the server side to carry out safety verification. The server can pre-store the identification of the virus file, so that whether the downloaded file is the virus file is rapidly judged, and a prompt message is sent to the network equipment, the network equipment can send the downloaded file to the intelligent terminal according to the prompt message if the downloaded file is the security file, and the virus prompt message can be used for replacing the downloaded file to send the downloaded file to the intelligent terminal if the downloaded file is the virus file, so that the virus file is intercepted, virus killing software does not need to be installed on the intelligent terminal, and the intelligent terminal can be prevented from being infected by viruses.
as shown in fig. 7, fig. 7 is a block diagram of another file processing apparatus shown in the present disclosure according to an exemplary embodiment, on the basis of the foregoing embodiment shown in fig. 6, the file processing module 64 includes: a first processing submodule 641 and a second processing submodule 642.
The first processing sub-module 641 is configured to send the target file to the intelligent terminal when the prompt message indicates that the target file is a secure file.
The second processing sub-module 642 is configured to send a virus reminding message to the intelligent terminal when the prompt message indicates that the target file is a virus file.
As shown in fig. 8, fig. 8 is a block diagram of another file processing apparatus shown in the present disclosure according to an exemplary embodiment, on the basis of the foregoing embodiment shown in fig. 6, the file processing module 64 includes:
The virus file processing sub-module 643, configured to send, according to the download address of the security file corresponding to the virus file carried in the prompt message, a virus notification message carrying the download address to the intelligent terminal.
According to the embodiment, the download address of the security file corresponding to the virus file can be obtained in advance, and after the target file is determined to be the virus file, the network device can be improved to provide the security file to the intelligent terminal, so that the intelligent terminal can download and obtain the corresponding security file.
as shown in fig. 9, fig. 9 is a block diagram of another file processing apparatus shown in the present disclosure according to an exemplary embodiment, which is based on the foregoing embodiment shown in fig. 6, and the apparatus further includes: the virus reminding message generating module 65 is configured to generate a virus reminding message in a web page format according to a preset web page template before the file processing module 64 sends the virus reminding message to the intelligent terminal.
It can be seen from the above embodiments that the virus reminding message can be in a web page format, and the message in the web page format occupies a small space and is easier to parse.
In an alternative implementation, the file identifier includes a hash value.
As can be seen from the foregoing embodiments, the file identifier may be a HASH value, and even if the identifiers of a large number of virus files are stored in the server, the HASH value serving as the file identifier can ensure the uniqueness of the file.
Correspondingly, the disclosure also provides a file processing server, which comprises a processor; a memory for storing processor-executable instructions; wherein the processor is configured to:
receiving a file identifier, wherein the file identifier is an identifier of a target file downloaded by network equipment;
according to the file identification, utilizing a pre-established file library to perform safety check on whether the target file is a virus file; wherein, the file library records the file identification of the virus file;
And sending a prompt message for indicating whether the target file is a virus file to the network equipment according to a safety check result.
Correspondingly, the present disclosure also provides a document processing apparatus, including: a processor; a memory for storing processor-executable instructions; wherein the processor is configured to:
Downloading a target file in response to a file downloading request initiated by an intelligent terminal;
acquiring a file identifier of the target file and sending the file identifier to a server;
Receiving a prompt message which is sent by a server and used for indicating whether the target file is a virus file or not;
And according to the indication of the prompt message, carrying out corresponding response processing on the file downloading request initiated by the intelligent terminal.
the implementation process of the functions and actions of each module in the above device is specifically described in the implementation process of the corresponding step in the above method, and is not described herein again.
For the device embodiments, since they substantially correspond to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points. The above-described embodiments of the apparatus are merely illustrative, wherein the modules described as separate parts may or may not be physically separate, and the parts displayed as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the modules can be selected according to actual needs to achieve the purpose of the disclosed solution. One of ordinary skill in the art can understand and implement it without inventive effort.
As shown in fig. 10, fig. 10 is a schematic view showing a configuration of a document processing apparatus 1000 according to an exemplary embodiment.
for example, the device 1000 may be provided as a server. Referring to fig. 10, the apparatus 1000 includes a processing component 1022 that further includes one or more processors and memory resources, represented by memory 1032, for storing instructions, such as application programs, that are executable by the processing component 1022. The application programs stored in memory 1032 may include one or more modules that each correspond to a set of instructions. Further, the processing component 1022 is configured to execute instructions to perform the above-described document processing methods.
The device 1000 may also include a power supply component 1026 configured to perform power management for the device 1300, a wired or wireless network interface 1050 configured to connect the device 1000 to a network, and an input/output (I/O) interface 1058. The device 1000 may operate based on an operating system stored in memory 1032, such as Android, IOS, Windows Server, Mac OS XTM, UnixTM, Linux, FreeBSDTM, or the like.
Wherein the instructions in the memory 1032, when executed by the processing component 1022, enable the apparatus 1000 to perform another file processing method, comprising:
Receiving a file identifier, wherein the file identifier is an identifier of a target file downloaded by network equipment;
According to the file identification, utilizing a pre-established file library to perform safety check on whether the target file is a virus file; wherein, the file library records the file identification of the virus file;
And sending a prompt message for indicating whether the target file is a virus file to the network equipment according to a safety check result.
As shown in fig. 11, fig. 11 is a schematic structural diagram of a file processing server 1100 according to an exemplary embodiment.
For example, network device 1100 may be an intelligent router or the like. Referring to fig. 11, the apparatus 1100 includes a processing component 1122 that further includes one or more processors and memory resources, represented by memory 1132, for storing instructions, such as application programs, executable by the processing component 1122. The application programs stored in memory 1132 may include one or more modules that each correspond to a set of instructions. Further, the processing component 1122 is configured to execute instructions to perform the above-described document processing methods.
the server 1100 may also include a power component 1126 configured to perform power management of the device 1100, a wired or wireless network interface 1150 configured to connect the device 1100 to a network, and an input/output (I/O) interface 1158. The apparatus 1100 may operate based on an operating system stored in the memory 1132, such as Android, IOS, Windows Server, Mac OS XTM, UnixTM, Linux, FreeBSDTM, or the like.
wherein the instructions in the memory 1132, when executed by the processing component 1122, enable the apparatus 1100 to perform another file processing method, comprising:
Downloading a target file in response to a file downloading request initiated by an intelligent terminal;
acquiring a file identifier of the target file and sending the file identifier to a server;
Receiving a prompt message which is sent by a server and used for indicating whether the target file is a virus file or not;
and according to the indication of the prompt message, carrying out corresponding response processing on the file downloading request initiated by the intelligent terminal.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This disclosure is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
it will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.
The above description is only exemplary of the present disclosure and should not be taken as limiting the disclosure, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present disclosure should be included in the scope of the present disclosure.

Claims (21)

1. a file processing method is applied to a server and comprises the following steps:
Receiving a file identifier, wherein the file identifier is an identifier of a target file downloaded by network equipment; the network equipment is connected with the intelligent terminal, and the target file is downloaded by the network equipment after responding to a file downloading request initiated by the intelligent terminal;
According to the file identification, utilizing a pre-established file library to perform safety check on whether the target file is a virus file; the file library records file identification of the virus file and a download address of the safety file corresponding to the virus file;
sending a prompt message for indicating whether the target file is a virus file to the network equipment according to a safety check result; wherein, the prompt message carries the download address.
2. the method according to claim 1, wherein the file library further records an association relationship among a file identifier of the virus file, a file identifier of the security file, and a download address of the security file.
3. the method of claim 2, wherein the library of documents is pre-established by:
Collecting virus files and obtaining file identifications of the virus files;
Collecting a security file corresponding to the virus file, and acquiring a file identifier and a download address of the security file;
And recording the association relation among the file identifier of the virus file, the file identifier of the security file and the download address of the security file.
4. a method according to any one of claims 1 to 3, wherein the file identity comprises a hash value.
5. a file processing method is applied to network equipment and comprises the following steps:
Downloading a target file in response to a file downloading request initiated by an intelligent terminal;
acquiring a file identifier of the target file and sending the file identifier to a server, and performing security check on whether the target file is a virus file or not by using a pre-established file library by the server according to the file identifier; the file library records file identification of the virus file and a download address of the safety file corresponding to the virus file;
Receiving a prompt message which is sent by a server and used for indicating whether the target file is a virus file or not; if the target file is a virus file, the prompt message carries a download address of a security file corresponding to the virus file;
and according to the indication of the prompt message, carrying out corresponding response processing on the file downloading request initiated by the intelligent terminal.
6. The method according to claim 5, wherein the performing corresponding response processing on the file download request initiated by the intelligent terminal according to the indication of the prompt message includes:
if the prompt message indicates that the target file is a safe file, the target file is sent to the intelligent terminal;
And if the prompt message indicates that the target file is a virus file, sending a virus reminding message to the intelligent terminal.
7. The method of claim 6, wherein the sending the virus alert message to the intelligent terminal comprises:
And sending a virus reminding message carrying the downloading address to the intelligent terminal according to the downloading address of the safety file corresponding to the virus file carried in the prompting message.
8. the method according to claim 5, wherein before the sending the virus alert message to the intelligent terminal, the method further comprises:
and generating a virus reminding message in a webpage format according to a preset webpage template.
9. The method according to any of claims 5 to 8, wherein the file identity comprises a hash value.
10. A file processing apparatus, applied to a server, includes:
The file identification receiving module is configured to receive a file identification, wherein the file identification is an identification of a target file downloaded by the network equipment; the network equipment is connected with the intelligent terminal, and the target file is downloaded by the network equipment after responding to a file downloading request initiated by the intelligent terminal;
the verification module is configured to perform safety verification on whether the target file is a virus file or not by utilizing a pre-established file library according to the file identifier; the file library records file identification of the virus file and a download address of the safety file corresponding to the virus file;
A prompt message sending module configured to send a prompt message for indicating whether the target file is a virus file to the network device according to a security check result; wherein, the prompt message carries the download address.
11. the apparatus according to claim 10, wherein the file library further records an association relationship among a file identifier of the virus file, a file identifier of the security file, and a download address of the security file.
12. the apparatus of claim 11, further comprising a document library creation module, the document library creation module comprising:
The virus file collecting submodule is configured to collect virus files and acquire file identifiers of the virus files;
The safety file collecting submodule is configured to collect the safety files corresponding to the virus files and acquire file identifiers and download addresses of the safety files;
and the incidence relation recording submodule is configured to record incidence relations among the file identifier of the virus file, the file identifier of the security file and the download address of the security file.
13. The apparatus according to any one of claims 10 to 12, wherein the file identifier comprises a hash value.
14. a document processing apparatus, characterized in that the apparatus comprises:
The target file downloading module is configured to respond to a file downloading request initiated by the intelligent terminal and download a target file;
the file identification sending module is configured to acquire a file identification of the target file and send the file identification to a server, and the server performs security check on whether the target file is a virus file or not by using a pre-established file library according to the file identification; the file library records file identification of the virus file and a download address of the safety file corresponding to the virus file;
the prompt message receiving module is configured to receive a prompt message which is sent by a server and used for indicating whether the target file is a virus file; if the target file is a virus file, the prompt message carries a download address of a security file corresponding to the virus file;
and the file processing module is configured to perform corresponding response processing on the file downloading request initiated by the intelligent terminal according to the indication of the prompt message.
15. The apparatus of claim 14, wherein the document processing module comprises a first processing sub-module and a second processing sub-module;
the first processing submodule is configured to send the target file to the intelligent terminal when the prompt message indicates that the target file is a safe file;
the second processing submodule is configured to send a virus reminding message to the intelligent terminal when the prompt message indicates that the target file is a virus file.
16. The apparatus of claim 15, wherein the document processing module comprises:
And the virus file processing submodule is configured to send a virus reminding message carrying the downloading address to the intelligent terminal according to the downloading address of the safety file corresponding to the virus file carried in the prompting message.
17. The apparatus of claim 14, further comprising: and the virus reminding message generating module is configured to generate a virus reminding message in a webpage format according to a preset webpage template before the file processing module sends the virus reminding message to the intelligent terminal.
18. the apparatus of claim 14, wherein the file identification comprises a hash value.
19. a file processing server, comprising:
a processor;
A memory for storing processor-executable instructions;
wherein the processor is configured to:
Receiving a file identifier, wherein the file identifier is an identifier of a target file downloaded by network equipment; the network equipment is connected with the intelligent terminal, and the target file is downloaded by the network equipment after responding to a file downloading request initiated by the intelligent terminal;
According to the file identification, utilizing a pre-established file library to perform safety check on whether the target file is a virus file; the file library records file identification of the virus file and a download address of the safety file corresponding to the virus file;
Sending a prompt message for indicating whether the target file is a virus file to the network equipment according to a safety check result; wherein, the prompt message carries the download address.
20. A document processing apparatus, characterized by comprising:
A processor;
a memory for storing processor-executable instructions;
Wherein the processor is configured to:
Downloading a target file in response to a file downloading request initiated by an intelligent terminal;
acquiring a file identifier of the target file and sending the file identifier to a server, and performing security check on whether the target file is a virus file or not by using a pre-established file library by the server according to the file identifier; the file library records file identification of the virus file and a download address of the safety file corresponding to the virus file;
receiving a prompt message which is sent by a server and used for indicating whether the target file is a virus file or not; if the target file is a virus file, the prompt message carries a download address of a security file corresponding to the virus file;
And according to the indication of the prompt message, carrying out corresponding response processing on the file downloading request initiated by the intelligent terminal.
21. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 9.
CN201610866551.5A 2016-09-29 2016-09-29 File processing method and device, server and equipment Active CN106411891B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610866551.5A CN106411891B (en) 2016-09-29 2016-09-29 File processing method and device, server and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610866551.5A CN106411891B (en) 2016-09-29 2016-09-29 File processing method and device, server and equipment

Publications (2)

Publication Number Publication Date
CN106411891A CN106411891A (en) 2017-02-15
CN106411891B true CN106411891B (en) 2019-12-06

Family

ID=59228154

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610866551.5A Active CN106411891B (en) 2016-09-29 2016-09-29 File processing method and device, server and equipment

Country Status (1)

Country Link
CN (1) CN106411891B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109800775B (en) * 2017-11-17 2022-10-28 腾讯科技(深圳)有限公司 File clustering method, device, equipment and readable medium
CN108038223A (en) * 2017-12-21 2018-05-15 珠海市君天电子科技有限公司 Garbage files information bank method for building up, garbage files recognition methods and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101576947A (en) * 2009-06-05 2009-11-11 成都市华为赛门铁克科技有限公司 Method, device and system for file protection treatment
CN101924760A (en) * 2010-08-17 2010-12-22 优视科技有限公司 Method and system for downloading executable file securely
CN102469146A (en) * 2010-11-19 2012-05-23 北京奇虎科技有限公司 Cloud security downloading method
CN102592103A (en) * 2011-01-17 2012-07-18 中国电信股份有限公司 Secure file processing method, equipment and system
CN104732141A (en) * 2013-12-24 2015-06-24 汉柏科技有限公司 Method for sampling and scanning viruses

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101576947A (en) * 2009-06-05 2009-11-11 成都市华为赛门铁克科技有限公司 Method, device and system for file protection treatment
CN101924760A (en) * 2010-08-17 2010-12-22 优视科技有限公司 Method and system for downloading executable file securely
CN102469146A (en) * 2010-11-19 2012-05-23 北京奇虎科技有限公司 Cloud security downloading method
CN102592103A (en) * 2011-01-17 2012-07-18 中国电信股份有限公司 Secure file processing method, equipment and system
CN104732141A (en) * 2013-12-24 2015-06-24 汉柏科技有限公司 Method for sampling and scanning viruses

Also Published As

Publication number Publication date
CN106411891A (en) 2017-02-15

Similar Documents

Publication Publication Date Title
US20170346805A1 (en) Login method and apparatus, and open platform system
CN107784552B (en) Information push task execution method and device, computer equipment and storage medium
CN102882886B (en) A kind of network terminal and method presenting the relevant information of access websites
WO2016101635A1 (en) Method, apparatus and device for synchronizing login status, and computer storage medium
EP3273362A1 (en) Webpage access method, apparatus, device and non-volatile computer storage medium
US10614208B1 (en) Management of login information affected by a data breach
US10411985B1 (en) Network traffic monitoring for virtual machines
CN111563015B (en) Data monitoring method and device, computer readable medium and terminal equipment
CN109446801B (en) Method, device, server and storage medium for detecting simulator access
CN109862021B (en) Method and device for acquiring threat information
CN104009977A (en) Information protection method and system
US10324896B2 (en) Method and apparatus for acquiring resource
CN107835228B (en) Instruction processing method and device based on dynamic generalized routing
CN102917049A (en) Method for showing information of visited website, browser and system
US20180248898A1 (en) Method and apparatus for identifying malicious website, and computer storage medium
CN112579118B (en) Method, device, system, medium and equipment for updating configuration information of micro-service
CN105187632B (en) Method and device for determining mobile phone number
CN115208951B (en) Request processing method, request processing device, electronic equipment and computer readable storage medium
CN107105428A (en) The method and device in quick completion end message storehouse
CN111131221A (en) Interface checking device, method and storage medium
CN109688094B (en) Suspicious IP configuration method, device, equipment and storage medium based on network security
CN106411891B (en) File processing method and device, server and equipment
CN111131236A (en) Web fingerprint detection device, method, equipment and medium
KR101115250B1 (en) Apparatus and method for checking safety of qr code
CN112925711A (en) Local joint debugging test method and related device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant